搜索结果: 1-8 共查到“军事学 Key Schedule”相关记录8条 . 查询时间(0.044 秒)
Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule
Key Recovery Rectangle Attack SKINNY
2019/6/19
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers ...
Variants of the AES Key Schedule for Better Truncated Differential Bounds
AES Key schedule Related-key Truncated Differential
2019/2/27
Differential attacks are one of the main ways to attack block ciphers. Hence, we need to evaluate the security of a given block cipher against these attacks. One way to do so is to determine the minim...
Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule
side-channel analysis fault attacks parity check countermeasure
2015/12/23
In this paper we study a parity check based countermeasure proposed by Chen
et al. that thwarts their attack by detecting byte fault injection during the AES key schedule
process.
Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images
Cold-boot attacks decayed memory SAT solvers
2010/7/13
Cold boot attack is a side channel attack which exploits the data remanence property of random access memory (RAM) to retrieve its contents which remain readable shortly after its power has been remov...
We describe an SPA attack on an 8-bit smart card implementation of the Serpent
block cipher. Our attack uses measurements taken during an on-the-fly key expansion
together with linearity in the ciph...
Differential Fault Analysis on the AES Key Schedule
Differential Fault Analysis AES Key Schedule
2009/6/2
This letter proposes a differential fault analysis on the AES key schedule
and shows how an entire 128-bit AES key can be retrieved. In the
workshop at FDTC 2007, we presented the DFA mechanism on t...
An Improved Power Analysis Attack Against Camellia's Key Schedule
Power Analysis Attack Camellia's Key Schedule
2009/3/6
This paper presents an improved simple power analysis attack against the key
schedule of Camellia. While the original attack required an exact determination of the
Hamming weight of intermediate dat...
This letter proposes a differential fault analysis on the AES key schedule
and shows how an entire 128-bit AES key can be retrieved. In the
workshop at FDTC 2007, we presented the DFA mechanism on t...